The course will be presented in an informal and flexible style. Interaction will be encouraged to ensure that the course proceeds at the pace and depth appropriate to the audience.
Participants will be familiarized with various vulnerability assessment tools, procedures prior to assessment, post-assessment, common vulnerability issues as well as reporting vulnerabilities found in computer system. PCs will be available for participants to experiment themselves.
Who Should Attend?
This course is designed for any practicing computer security analyst and developers, database administrators, business users and non-technical end users who are interested in computer forensic and security areas
Lectures, discussions, Exercises & Practical. demonstration using Nmap, Metasploit and Nessus